首页 | 本学科首页   官方微博 | 高级检索  
     

基于瀑布模型的可信取证方法
引用本文:孙国梓,俞超,陈丹伟,金仙力.基于瀑布模型的可信取证方法[J].信息网络安全,2009(7):4-6,20.
作者姓名:孙国梓  俞超  陈丹伟  金仙力
作者单位:南京邮电大学计算机技术研究所,江苏省,南京市,210003;南京邮电大学计算机学院,江苏,南京,210003
基金项目:国家科技攻关项目,国家自然科学基金,南京邮电大学攀登计划项目 
摘    要:给出"人+工具+证明"的取证模式,提出可信取证理念。从电子数据的静态属性可信性和取证方法动态行为的可信性两个方面对可信取证体系进行研究,以便最终形成可信的电子证据结果。建立基于瀑布模型的电子取证模型,从可信表达、可信分析、可信提取、可信固定以及可信发现等方面加以分析。

关 键 词:信息安全  可信取证  瀑布模型  有效性  取证模型

The methods of trusted forensic based on waterfall model
SUN Guo-zi,YU Chao,CHEN Dan-wei,JIN Xian-li.The methods of trusted forensic based on waterfall model[J].Netinfo Security,2009(7):4-6,20.
Authors:SUN Guo-zi  YU Chao  CHEN Dan-wei  JIN Xian-li
Affiliation:SUN Guo-zi, YU Chao, CHEN Dan-wei, JIN Xian-li( 1.Institute of Computer Technology, Nanjing University of Posts & Telecommunications, Nanjing 210003, China; 2. College of Computer, Nanjing University of Posts & Telecommunications, Nanjing 210003, China )
Abstract:After giving the forensic model of "man + tools + confirmation", trusted forensic (TF) is proposed. From the trusted static attributes of digital data and trusted dynamic behavior of forensic method, the TF's goal is to get the trusted result. According to the strict process of computer forensics, the computer forensics model is been built based on the waterfall model. Finally, the model is analyzed from five aspects, such as trusted expressing, trusted analyzing, trusted extracting, trusted fixing, and trusted discovering.
Keywords:Information security  Trusted forensics  Waterfall model  Reliability  Forensic model
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号